Security
follows
three
objectives
,
that
are
____________________
,
____________________
,
____________________
.
____________________
,
____________________
and
____________________
should
be
protected
.
Security
measures
are
divided
into
____________________
groups
.
We
have
to
introduce
a
____________________
to
access
to
the
resources
.
____________________
is
applied
to
restore
the
system
when
it
has
been
modified
or
damaged
.
Malicious
softwares
are
called
____________________
.
We
detect
,
block
and
remove
the
malicious
softwares
with
an
____________________
.
Firewall
is
a
____________________
or
____________________
____________________
used
to
control
connections
and
it
doesn't
allow
non
authorized
access
to
the
computer
or
to
the
network
.
Thanks
to
the
____________________
____________________
if
you
have
a
problem
with
your
system
you
can
restore
it
to
a
previous
state
without
losing
the
information
.
In
wireless
networks
the
information
is
transmitted
by
____________________
____________________
.
____________________
is
used
to
protect
the
information
sent
over
the
Internet
.